Skip to main content

About your Search

20121101
20121130
Search Results 0 to 3 of about 4
. >> next a look at the fbi and its role in investigating cyber related crimes. from this morning's "washington journal" this is about 45 minutes. >> this week's segment involving your money will look at the fbi's role in fighting cyber crimes. and we are talking about-based terrorism, espionage. computer intrusions, major cyber fraud. will learn a little bit, then we will get to your calls and will learn a little bit first from shawn henry, who was the fbi's executive director for criminal and cyber programs. and been in a peer for quite a number of years by thank you for joining us. >> thanks are having. spent first of all what exactly is a cybercrime? >> when you talk about cyber, i think danger to any type of criminal activity that involves the use of the computer i think that's what most people talk about. when i talk about cybercrime on focusing on intrusions into computer networks. so those networks that we all use every single day come to increase efficiency and effectiveness in and our productivity. but those very same things that make those networks were effective for us
of the fbi's cyber division. he held the highest ranking position in the fbi's cyber division, and he will be playing, um, the fbi director. so we have general cartwright playing the role of national security adviser, bill lynn is the secretary of defense -- um, this is perfect because it's halloween, so it's kind of even easier to play roles. [laughter] and we have steve to bin sky head of the fbi. and on your, on your screens you'll also see when your names come up, you'll see the roles that they're playing, and on your table we also have the agenda. and dmitri is the co-founder and chief technology officer for cloud strike, he's a computer security researcher, he helps focus business and governments on how to protect their intellectual property. and dmitri is going to play the role of the ceo of the oil company that gets hit in this exercise. dmitri is on the final end. and we have james lewis beside him, he's a senior fellow and program director for csis, he's worked at the state department and commerce, and he's a leading global expert on cyber. in 2010 he was with the united nat
various leading government officials up there all back that up, including director of the fbi. i'm paraphrasing, but he said these two categories of companies. those that have been compromised and will be gorgeous so delicate. so that's the shocking statistics to take. it is not uncommon for a credit card company to come back to emerge it and say hey, our threat vector detection system is more sophisticated than yours. we are picking up some indications he been compromised. here's what you need to look at. some recent examples of some very high profile and public incidents that have occurred recently. rsa, the cybersecurity company files was breached in 2011 and that led to a number of other breaches because their systems are used by many companies to provide this company's own security systems. in addition, there is a classic financial crimes case involving sony. i think that one of the takeaways from these examples is that these are not -- these are companies technologically sophisticated pressure in the cyberworld and they themselves were reached. so these are wal-marts for co
more problematic. i think one of the other panelists mentioned this quote from fbi director, and you see the same concerns of talking about in the commercial sphere, to. he said basically set to every company is being hacked one way or another and it's not a question of when they will be hacked. it will be a question of when it will happen again. that might be a pessimistic view of how bitter cybersecurity sector can be. it is certainly a theme you see in the space. my only point, the only other point i want to make on commercial data is that you see and report. there was a report issued by verizon about data breach investigation, that suggests that a lease in endears large numbers of serious cyber intrusions intrusions have been aimed at create taking authentication credential, passwords, usernames, things like that. things that can be used for later inclusion's in the future, things that might give an intruder broader access to a network. so i'd like to shift for a moment, those ideas in mind, and talk about offense of cyber operations. and what do we mean by that and what is, what
Search Results 0 to 3 of about 4